Auto-Update: 2025-06-16T12:00:19.287786+00:00

This commit is contained in:
cad-safe-bot 2025-06-16 12:03:56 +00:00
parent 6107668da8
commit 5c1b64b714
12 changed files with 943 additions and 31 deletions

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-25264",
"sourceIdentifier": "info@cert.vde.com",
"published": "2025-06-16T10:15:19.517",
"lastModified": "2025-06-16T10:15:19.517",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An unauthenticated remote attacker can take advantage of the current overly permissive CORS policy to gain access and read the responses, potentially exposing sensitive data or enabling further attacks."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "info@cert.vde.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "info@cert.vde.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-942"
}
]
}
],
"references": [
{
"url": "https://certvde.com/en/advisories/VDE-2025-018/",
"source": "info@cert.vde.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-25265",
"sourceIdentifier": "info@cert.vde.com",
"published": "2025-06-16T10:15:20.807",
"lastModified": "2025-06-16T10:15:20.807",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A web application for configuring the controller is accessible at a specific path. It contains an endpoint that allows an unauthenticated remote attacker to read files from the system\u2019s file structure."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "info@cert.vde.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "info@cert.vde.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"references": [
{
"url": "https://certvde.com/en/advisories/VDE-2025-018/",
"source": "info@cert.vde.com"
}
]
}

View File

@ -0,0 +1,49 @@
{
"id": "CVE-2025-40916",
"sourceIdentifier": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
"published": "2025-06-16T11:15:17.793",
"lastModified": "2025-06-16T11:15:17.793",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Mojolicious::Plugin::CaptchaPNG version 1.05 for Perl uses a weak random number source for generating the captcha.\n\nThat version uses the built-in rand() function for generating the captcha text as well as image noise, which is insecure."
}
],
"metrics": {},
"weaknesses": [
{
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-338"
},
{
"lang": "en",
"value": "CWE-804"
}
]
}
],
"references": [
{
"url": "https://metacpan.org/pod/perlfunc#rand",
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e"
},
{
"url": "https://metacpan.org/release/GRYPHON/Mojolicious-Plugin-CaptchaPNG-1.04/diff/GRYPHON/Mojolicious-Plugin-CaptchaPNG-1.05/lib/Mojolicious/Plugin/CaptchaPNG.pm",
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e"
},
{
"url": "https://metacpan.org/release/GRYPHON/Mojolicious-Plugin-CaptchaPNG-1.06/changes",
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e"
},
{
"url": "https://security.metacpan.org/docs/guides/random-data-for-security.html",
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e"
}
]
}

View File

@ -0,0 +1,45 @@
{
"id": "CVE-2025-47868",
"sourceIdentifier": "security@apache.org",
"published": "2025-06-16T11:15:18.437",
"lastModified": "2025-06-16T11:15:18.437",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Out-of-bounds Write resulting in possible Heap-based Buffer Overflow vulnerability was discovered in tools/bdf-converter font conversion utility that is part of Apache NuttX RTOS repository. This standalone program is optional and neither part of NuttX RTOS nor Applications runtime, but active bdf-converter users may be affected when this tool is exposed to external provided user data data (i.e. publicly available automation).\n\nThis issue affects Apache NuttX: from 6.9 before 12.9.0.\n\nUsers are recommended to upgrade to version 12.9.0, which fixes the issue."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-122"
},
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://github.com/apache/nuttx/pull/16000",
"source": "security@apache.org"
},
{
"url": "https://lists.apache.org/thread/p4o2lcqgspx3ws1n2p4wmoqbqow1w1pw",
"source": "security@apache.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2025/06/14/1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -0,0 +1,41 @@
{
"id": "CVE-2025-47869",
"sourceIdentifier": "security@apache.org",
"published": "2025-06-16T11:15:18.590",
"lastModified": "2025-06-16T11:15:18.590",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability was discovered in Apache NuttX RTOS apps/exapmles/xmlrpc application. In this example application device stats structure that stored remotely provided parameters had hardcoded buffer size which could lead to buffer overflow. Structure members buffers were updated to valid size of CONFIG_XMLRPC_STRINGSIZE+1.\n\nThis issue affects Apache NuttX RTOS users that may have used or base their code on example application as presented in releases from 6.22 before 12.9.0.\n\nUsers of XMLRPC in Apache NuttX RTOS are advised to review their code \nfor this pattern and update buffer sizes as presented in the version of \nthe example in release 12.9.0."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"references": [
{
"url": "https://github.com/apache/nuttx-apps/pull/3027",
"source": "security@apache.org"
},
{
"url": "https://lists.apache.org/thread/306qcqyc3bpb2ozh015yxjo9kqs4jbvj",
"source": "security@apache.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2025/06/14/2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -0,0 +1,86 @@
{
"id": "CVE-2025-4748",
"sourceIdentifier": "6b3ad84c-e1a6-4bf7-a703-f496b71e49db",
"published": "2025-06-16T11:15:18.730",
"lastModified": "2025-06-16T11:15:18.730",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Erlang OTP (stdlib modules) allows Absolute Path Traversal, File Manipulation. This vulnerability is associated with program files lib/stdlib/src/zip.erl and program routines zip:unzip/1, zip:unzip/2, zip:extract/1, zip:extract/2\u00a0unless the memory option is passed.\n\nThis issue affects OTP from OTP 17.0 until OTP\u00a028.0.1, OTP\u00a027.3.4.1 and OTP\u00a026.2.5.13, corresponding to stdlib from 2.0 until 7.0.1, 6.2.2.1 and 5.2.3.4."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "6b3ad84c-e1a6-4bf7-a703-f496b71e49db",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "PASSIVE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "LOW",
"subAvailabilityImpact": "LOW",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "6b3ad84c-e1a6-4bf7-a703-f496b71e49db",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://github.com/erlang/otp/pull/9941",
"source": "6b3ad84c-e1a6-4bf7-a703-f496b71e49db"
},
{
"url": "https://github.com/erlang/otp/security/advisories/GHSA-9g37-pgj9-wrhc",
"source": "6b3ad84c-e1a6-4bf7-a703-f496b71e49db"
},
{
"url": "https://www.erlang.org/doc/system/versions.html#order-of-versions",
"source": "6b3ad84c-e1a6-4bf7-a703-f496b71e49db"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2025-6116",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-16T10:15:20.987",
"lastModified": "2025-06-16T10:15:20.987",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Das Parking Management System \u505c\u8f66\u573a\u7ba1\u7406\u7cfb\u7edf 6.2.0. It has been classified as critical. This affects an unknown part of the file /IntraFieldVehicle/Search of the component API. The manipulation of the argument Value leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/K-mxredo/MXdocument/blob/K-mxredo-blob/%E5%81%9C%E8%BD%A6%E5%9C%BA%E7%B3%BB%E7%BB%9FIntraFieldVehicle-Search.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.312585",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.312585",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.591160",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2025-6117",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-16T10:15:21.233",
"lastModified": "2025-06-16T10:15:21.233",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Das Parking Management System \u505c\u8f66\u573a\u7ba1\u7406\u7cfb\u7edf 6.2.0. It has been declared as critical. This vulnerability affects unknown code of the file /Reservations/Search of the component API. The manipulation of the argument Value leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/K-mxredo/MXdocument/blob/K-mxredo-blob/%E5%81%9C%E8%BD%A6%E5%9C%BA%E7%B3%BB%E7%BB%9FReservations-Search.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.312586",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.312586",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.591161",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2025-6118",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-16T11:15:19.007",
"lastModified": "2025-06-16T11:15:19.007",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Das Parking Management System \u505c\u8f66\u573a\u7ba1\u7406\u7cfb\u7edf 6.2.0. It has been rated as critical. This issue affects some unknown processing of the file /vehicle/search of the component API. The manipulation of the argument vehicleTypeCode leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/K-mxredo/MXdocument/blob/K-mxredo-blob/%E5%81%9C%E8%BD%A6%E5%9C%BA%E7%B3%BB%E7%BB%9Fvehicle-search.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.312587",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.312587",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.591173",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,149 @@
{
"id": "CVE-2025-6119",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-16T11:15:19.210",
"lastModified": "2025-06-16T11:15:19.210",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in Open Asset Import Library Assimp up to 5.4.3. Affected is the function Assimp::BVHLoader::ReadNodeChannels in the library assimp/code/AssetLib/BVH/BVHLoader.cpp. The manipulation of the argument pNode leads to use after free. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The project decided to collect all Fuzzer bugs in a main-issue to address them in the future."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 4.3,
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.1,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://github.com/assimp/assimp/issues/6219",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/assimp/assimp/issues/6219#issuecomment-2945016005",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/user-attachments/files/20604791/reproduce_2.tar.gz",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.312588",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.312588",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.591233",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-06-16T10:00:20.163144+00:00
2025-06-16T12:00:19.287786+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-06-16T09:15:20.493000+00:00
2025-06-16T11:15:19.210000+00:00
```
### Last Data Feed Release
@ -33,32 +33,29 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
297997
298007
```
### CVEs added in the last Commit
Recently added CVEs: `12`
Recently added CVEs: `10`
- [CVE-2025-2091](CVE-2025/CVE-2025-20xx/CVE-2025-2091.json) (`2025-06-16T09:15:19.067`)
- [CVE-2025-3464](CVE-2025/CVE-2025-34xx/CVE-2025-3464.json) (`2025-06-16T09:15:19.233`)
- [CVE-2025-40726](CVE-2025/CVE-2025-407xx/CVE-2025-40726.json) (`2025-06-16T09:15:19.427`)
- [CVE-2025-40727](CVE-2025/CVE-2025-407xx/CVE-2025-40727.json) (`2025-06-16T09:15:19.587`)
- [CVE-2025-40728](CVE-2025/CVE-2025-407xx/CVE-2025-40728.json) (`2025-06-16T09:15:19.733`)
- [CVE-2025-40729](CVE-2025/CVE-2025-407xx/CVE-2025-40729.json) (`2025-06-16T09:15:19.873`)
- [CVE-2025-4987](CVE-2025/CVE-2025-49xx/CVE-2025-4987.json) (`2025-06-16T08:15:18.787`)
- [CVE-2025-6112](CVE-2025/CVE-2025-61xx/CVE-2025-6112.json) (`2025-06-16T08:15:20.010`)
- [CVE-2025-6113](CVE-2025/CVE-2025-61xx/CVE-2025-6113.json) (`2025-06-16T08:15:20.227`)
- [CVE-2025-6114](CVE-2025/CVE-2025-61xx/CVE-2025-6114.json) (`2025-06-16T09:15:20.013`)
- [CVE-2025-6115](CVE-2025/CVE-2025-61xx/CVE-2025-6115.json) (`2025-06-16T09:15:20.300`)
- [CVE-2025-6172](CVE-2025/CVE-2025-61xx/CVE-2025-6172.json) (`2025-06-16T09:15:20.493`)
- [CVE-2025-25264](CVE-2025/CVE-2025-252xx/CVE-2025-25264.json) (`2025-06-16T10:15:19.517`)
- [CVE-2025-25265](CVE-2025/CVE-2025-252xx/CVE-2025-25265.json) (`2025-06-16T10:15:20.807`)
- [CVE-2025-40916](CVE-2025/CVE-2025-409xx/CVE-2025-40916.json) (`2025-06-16T11:15:17.793`)
- [CVE-2025-4748](CVE-2025/CVE-2025-47xx/CVE-2025-4748.json) (`2025-06-16T11:15:18.730`)
- [CVE-2025-47868](CVE-2025/CVE-2025-478xx/CVE-2025-47868.json) (`2025-06-16T11:15:18.437`)
- [CVE-2025-47869](CVE-2025/CVE-2025-478xx/CVE-2025-47869.json) (`2025-06-16T11:15:18.590`)
- [CVE-2025-6116](CVE-2025/CVE-2025-61xx/CVE-2025-6116.json) (`2025-06-16T10:15:20.987`)
- [CVE-2025-6117](CVE-2025/CVE-2025-61xx/CVE-2025-6117.json) (`2025-06-16T10:15:21.233`)
- [CVE-2025-6118](CVE-2025/CVE-2025-61xx/CVE-2025-6118.json) (`2025-06-16T11:15:19.007`)
- [CVE-2025-6119](CVE-2025/CVE-2025-61xx/CVE-2025-6119.json) (`2025-06-16T11:15:19.210`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `0`
- [CVE-2025-1268](CVE-2025/CVE-2025-12xx/CVE-2025-1268.json) (`2025-06-16T09:15:18.870`)
## Download and Usage

View File

@ -283418,7 +283418,7 @@ CVE-2025-1264,0,0,28c40552206eb9f5a0b03a9cca8beeb7d7df89ca0a5becb5749e460941f9fd
CVE-2025-1265,0,0,bc018ef071fadf7e153cbb8aa96a03eb4bac560d27730ea77e8eae7baedae9e8,2025-02-20T20:15:46.537000
CVE-2025-1266,0,0,4994c9c1e87b7dedc2dce4e0a436027ae116cf2eed8bcb3d9cc4ca13f9be4407,2025-03-13T22:15:14.907000
CVE-2025-1267,0,0,8185c9604ff0d1aa86b9cea920d82bd8037570ce9b9b7776f5513234b5775eda,2025-04-01T20:26:11.547000
CVE-2025-1268,0,1,b26cb2e3f9391aa1deea3c60085ffe6961c8fdb9f9fd34bf05939dcfc884b2c4,2025-06-16T09:15:18.870000
CVE-2025-1268,0,0,b26cb2e3f9391aa1deea3c60085ffe6961c8fdb9f9fd34bf05939dcfc884b2c4,2025-06-16T09:15:18.870000
CVE-2025-1269,0,0,3d8990f3f321bb84afc5ce31cc37206b4dfeae7b9639d4320eceb6f39d26cfbc,2025-02-18T14:15:28.513000
CVE-2025-1270,0,0,a0fba4bca59afda304bf8335640266a3acf6a1624640bee675db51d94e9fc436,2025-02-13T13:15:09.273000
CVE-2025-1271,0,0,0359319eae8a142a0720b34e58c3d3808902c47ddd06a524c0e8a18f2f2f366a,2025-02-13T13:15:09.433000
@ -284387,7 +284387,7 @@ CVE-2025-20906,0,0,227b94242ada97f5f1b38d2297103a593c8ae5078c64d6e33b6eecd693ed4
CVE-2025-20907,0,0,379c340eb54b31b9cb5f71668b76a83cd25f313f0ca982b642024600b12637ce,2025-02-12T13:49:49.460000
CVE-2025-20908,0,0,576d0c932c62fad7894b616fe95f3b3030f52a9c25cc8141c044406a0e0a7fc0,2025-03-06T05:15:17.150000
CVE-2025-20909,0,0,661128f74b5e1570cc0c738206adeffe7913c3464aea431885d2b5b77ff6aec8,2025-03-06T05:15:17.307000
CVE-2025-2091,1,1,1100ba577be997cc84f23a5d8de969b9672830c14158077dbaea0ab8a2fe46cb,2025-06-16T09:15:19.067000
CVE-2025-2091,0,0,1100ba577be997cc84f23a5d8de969b9672830c14158077dbaea0ab8a2fe46cb,2025-06-16T09:15:19.067000
CVE-2025-20910,0,0,8eeef360bd8ee8e6ea808c95de07cab8422342433bb9ea5f3273d310585c156c,2025-03-06T05:15:17.480000
CVE-2025-20911,0,0,48bf673220f74bc55aa347d4893646bb5408aef810bd43f32e472aa676cc2420,2025-03-06T05:15:17.653000
CVE-2025-20912,0,0,f7767b1d03f69e82598a74f1eeca9546a2bd4c871a4556075c66e1b7bf13c7d1,2025-03-06T05:15:17.860000
@ -288225,6 +288225,8 @@ CVE-2025-25250,0,0,aac8ea3f566a4f0fab76786534ffbed271242803ebb8f8326ca4434e79caf
CVE-2025-25251,0,0,7ba720b0969d846f1f4c94132b0eb572e4c9a81f6898891b935d17882c7c0a34,2025-06-04T15:37:46.183000
CVE-2025-25254,0,0,c4f21e6036ba144ab43461c15a785205542371d6b8f941619552468f7ca5bf0a,2025-04-08T18:13:53.347000
CVE-2025-2526,0,0,b4d2665b0df39fb8efb0ebc6a7ec708e940ede0cae79c4c99d0922650362cbb0,2025-04-08T18:13:53.347000
CVE-2025-25264,1,1,86b9e5b79b20d278978c57ce08d4b8fbb5a135acee48275f457b611bef6c5940,2025-06-16T10:15:19.517000
CVE-2025-25265,1,1,0cded1ddd3e05f0a8a145ebce41d520505e5edaca5763e405e4d4b9a487d8e21,2025-06-16T10:15:20.807000
CVE-2025-25266,0,0,14fc4214833d5ffeb8f363743939de320f9169af46798b63b6da510cc3dfff47,2025-03-11T10:15:17.850000
CVE-2025-25267,0,0,327b2100edff4cbf9fdcfe1321dc00713a82279b4ead6a7ccdc62b6f97970ac6,2025-03-11T10:15:18.030000
CVE-2025-2527,0,0,7eee1c306ec3796fb3e2b284b23cda1a7bd91e67491cf652c8d7df0439106c96,2025-05-16T14:43:26.160000
@ -293304,7 +293306,7 @@ CVE-2025-3460,0,0,a6918e85be5e4f2f6bd8b4089f3f654f6c5d78ba27d378dcd7c473c63506e9
CVE-2025-3461,0,0,b711842f3138044403b9c62c870e92a946a81dbd27b6e170abe8935ae6232ced,2025-06-09T19:15:24.923000
CVE-2025-3462,0,0,96a08229937a9712440a065f7abf8858b2712ba35f45d182986e12e301979bf4,2025-05-12T17:32:52.810000
CVE-2025-3463,0,0,b9c293fc915bcaaa130da553f49fb5680a86dfb762948cd4b867acf35ebae4a2,2025-05-12T17:32:52.810000
CVE-2025-3464,1,1,f761b82c82eea0b93334397438eaaecbc92df6f30dac7cf49538babc36a751ec,2025-06-16T09:15:19.233000
CVE-2025-3464,0,0,f761b82c82eea0b93334397438eaaecbc92df6f30dac7cf49538babc36a751ec,2025-06-16T09:15:19.233000
CVE-2025-3468,0,0,136950783d88ce0e5a3cbb5efc9cbb24284feffc83746ee503e38c1107465276,2025-06-04T22:54:54.960000
CVE-2025-3469,0,0,4bca5426f9919f93dad9a4b1c330f34d47eacab0082cc9b29903729bbc139092,2025-04-11T15:39:52.920000
CVE-2025-3470,0,0,19aa6171d68cb7df7c1f3be18d7bfe917a85b5b7f1d5f3673d31726045a39093,2025-04-15T18:39:27.967000
@ -294448,10 +294450,10 @@ CVE-2025-4069,0,0,72c3e148c8cf8c4d5070733c3b3e33573ee47e1d4dc46e158ed5117d25968f
CVE-2025-4070,0,0,95239c8a358b05c88e31535f0df25ceb69331749309a950b338783db56336302,2025-05-09T13:50:22.543000
CVE-2025-4071,0,0,68547b4133937980d039f29a0abcfa60e8d56aeeed72b73dfe6880158fc5f6a5,2025-05-09T13:51:10.523000
CVE-2025-4072,0,0,d0cf8b7d2285b873c553b1cc40373ece79b00a96b5dd7782b5277899efb2c1fa,2025-05-09T13:51:19.130000
CVE-2025-40726,1,1,1af41231384f6012aa660a6b373a378c828e9aa5b462b91f2ba4a3ed87c37abf,2025-06-16T09:15:19.427000
CVE-2025-40727,1,1,667d0fac5d54ea5f12a9fe24fa479f6d4ec4f4b9185a88f1e1a0a20a286abf68,2025-06-16T09:15:19.587000
CVE-2025-40728,1,1,29460beadecfc1574da29cb5197853ba6bce1dc9e59afa3f271b244b5bd94337,2025-06-16T09:15:19.733000
CVE-2025-40729,1,1,528214f9324db9bf5c792911946cf1201b36e8ae55ed53e8fe291198902d9f87,2025-06-16T09:15:19.873000
CVE-2025-40726,0,0,1af41231384f6012aa660a6b373a378c828e9aa5b462b91f2ba4a3ed87c37abf,2025-06-16T09:15:19.427000
CVE-2025-40727,0,0,667d0fac5d54ea5f12a9fe24fa479f6d4ec4f4b9185a88f1e1a0a20a286abf68,2025-06-16T09:15:19.587000
CVE-2025-40728,0,0,29460beadecfc1574da29cb5197853ba6bce1dc9e59afa3f271b244b5bd94337,2025-06-16T09:15:19.733000
CVE-2025-40729,0,0,528214f9324db9bf5c792911946cf1201b36e8ae55ed53e8fe291198902d9f87,2025-06-16T09:15:19.873000
CVE-2025-4073,0,0,5b07f84aef869ff97a5846e761decacb25d1866933f52ae6973131cfce282ea0,2025-05-09T13:51:33.337000
CVE-2025-4074,0,0,67c949a36ba05d695588494a1af59c90dcd6f218e799b578e62cc10508e92154,2025-05-09T13:49:25.337000
CVE-2025-4075,0,0,980439803ac2a564a1211ca7907d1f8cd24fb9992986c85d77b9d15e9738b3a9,2025-05-02T13:53:40.163000
@ -294481,6 +294483,7 @@ CVE-2025-40911,0,0,fcf4deedf6cc79e67d521479df45c4b1f5ac81bf8605fcf0e3b318f0c121b
CVE-2025-40912,0,0,9ba3f2cd315b774e22eefeae7f50556e7e21969b27b3e56a0182e075b776e0e8,2025-06-12T16:06:20.180000
CVE-2025-40914,0,0,d97f0218886a2196b25d92bce59ddded5460306f920589ecc2b10f196fdbc150,2025-06-12T16:06:20.180000
CVE-2025-40915,0,0,7617e1cfd1c49592d1bfc64c026613af6afc23761ab7c676ffac796004de7683,2025-06-12T16:06:20.180000
CVE-2025-40916,1,1,ae374f655d86021346f632c3958642baeefbff9699c0d8874572fb9af7e9c062,2025-06-16T11:15:17.793000
CVE-2025-4092,0,0,5c481b9edaa4dc01b6e2af0355fb37068b547aa3807c69c17d8381f725e9d766,2025-05-09T19:32:00.773000
CVE-2025-4093,0,0,426d6945e92bfa0f6784cfac27262306e33a71ed38b9d14699e5d2c984a980bf,2025-05-09T19:31:46.917000
CVE-2025-4094,0,0,9389e1771cac6e6188e563be99dd04161be542f25f3d0fbc50799f1a765f05af,2025-06-09T20:13:20.070000
@ -296155,6 +296158,7 @@ CVE-2025-47475,0,0,419116b80f7fe9386a9aac3c0836858ef647ac252eac4b1ff08d67e0a3375
CVE-2025-47476,0,0,f06946c9db65910277eefdd02a4e277fdae7c5884111c0fe22a4a0e5abb63365,2025-05-08T14:39:18.800000
CVE-2025-47477,0,0,77da2db11e5826e5ac8b7646c2ab3c2664e4f15f6b958d535ab609737d59cbfd,2025-06-12T16:06:47.857000
CVE-2025-47478,0,0,e6d6adb3b1616923ef0638df6a5bba4a6a66b2f12e5e8ad860cddbc43d60dfda,2025-05-23T15:54:42.643000
CVE-2025-4748,1,1,437e61f751ac72ed3a329c51c921b19ab2da9f1a11da21895600087ddc961e66,2025-06-16T11:15:18.730000
CVE-2025-47480,0,0,ef5cc5737d0e088e76573f050c6e079a8e6e4769a34e7600bd175867d6608ec8,2025-05-08T14:39:18.800000
CVE-2025-47481,0,0,9dd0d7411f22176e27723210f288403628c90f1234e60ae0d0856344023dd406,2025-05-08T14:39:18.800000
CVE-2025-47482,0,0,961d8ef4753c50b36e4d7feaf8debc74b4e022889d69dcdb4a7b418fc8bebc1e,2025-05-08T14:39:18.800000
@ -296460,6 +296464,8 @@ CVE-2025-47861,0,0,3d4afc0f6007bc959010138ccc124a6b3a3b56f79923467daa5b523b555c8
CVE-2025-47862,0,0,10e588a747b987e4be2e09155f4160fe17df1ee74eee593b30634360724aa219,2025-05-13T04:16:27.597000
CVE-2025-47863,0,0,36620174019b6cc7c4127108cfc627947af1c045488d10587a581071ed50838e,2025-05-13T04:16:27.657000
CVE-2025-47864,0,0,a7630e6b56face876bab50ada284160d7000173d4dd10948b2856168893da548,2025-05-13T04:16:27.717000
CVE-2025-47868,1,1,756d50287d9eeaf040431692d9779547a447f2e68bc304423220684d1319f1fd,2025-06-16T11:15:18.437000
CVE-2025-47869,1,1,ad7c8179c668e54fe16d85809121a81a54a5891d87481fe302cf507e34dfbcdb,2025-06-16T11:15:18.590000
CVE-2025-4787,0,0,70171c374cc28e10623f3aef3f6906d1bab0599aa174f66a1665228af79ea2e4,2025-05-23T14:02:33.847000
CVE-2025-4788,0,0,6549de8473f891daf65760389e77371268c3135604d761cfc045c33ff9e38a07,2025-05-23T13:40:39.103000
CVE-2025-47884,0,0,4a77a59ba7de92eec80221a3e38c584f28852ee782b873242f9a5e28747dea9d,2025-06-12T13:48:38.967000
@ -297230,7 +297236,7 @@ CVE-2025-4983,0,0,8b53f9fcac717498609c6596ba194e3872474340efe5891a55ff7cfbe70e31
CVE-2025-4984,0,0,8011ca13e469a81f6afb4511e42cccafc7f5c3edf7ae8617debc1cb5fd406589,2025-05-30T16:31:03.107000
CVE-2025-4985,0,0,88151f8f37213547b95261cc34f75717fde2a8ef982c36b2d93a8904176e3178,2025-05-30T16:31:03.107000
CVE-2025-4986,0,0,0d635bfcd5ea7157ed48c7c5f6511d7b519fc07571e2245e906f4237ec28c07f,2025-05-30T16:31:03.107000
CVE-2025-4987,1,1,5b8d996ac86b68ca9a947df5c0b2ea6fdecb4a2fdee697d3645bfd8856c947f8,2025-06-16T08:15:18.787000
CVE-2025-4987,0,0,5b8d996ac86b68ca9a947df5c0b2ea6fdecb4a2fdee697d3645bfd8856c947f8,2025-06-16T08:15:18.787000
CVE-2025-4988,0,0,a7c799add205e04161903a2f90e2fafc16c75a5a4daac88e051c1af2ef20204f,2025-05-30T16:31:03.107000
CVE-2025-4989,0,0,74686f3d4372e905fa27c624734660eade1cfc1a7c1d6b7d7fe07ac62f07c46a,2025-05-30T16:31:03.107000
CVE-2025-4990,0,0,11128ad236ff0bbb6407ba12ca704aae39e79d15ca91d8e93c05e36bda39beb6,2025-05-30T16:31:03.107000
@ -297990,9 +297996,13 @@ CVE-2025-6108,0,0,052486f7c1a2ef350fec9a9a6b4942ddfdbdfaeab96c5024acc201259a6d80
CVE-2025-6109,0,0,456d88ea582e7752c5f08127d0fea44abd14ec99dc45815323479e72f75d3e52,2025-06-16T06:15:20.213000
CVE-2025-6110,0,0,2868c073105f9241d86db7e941b5f58d3804a06756b846893d91e77093b6acde,2025-06-16T07:15:18.373000
CVE-2025-6111,0,0,828492d35f46af5f4bd617fbf9695a7354eeabafa01bcbe1aecb08dbc8200b6d,2025-06-16T07:15:19.870000
CVE-2025-6112,1,1,03192921fcb3ce4b573c976cde60b3298c837468da8da701519d4ad029a6e0e6,2025-06-16T08:15:20.010000
CVE-2025-6113,1,1,c228ada00f832720a15995e7d0fadbc924d7d4afc603f57e382f08aa1623a1a9,2025-06-16T08:15:20.227000
CVE-2025-6114,1,1,227f4fe7537286c6d9a129b77082eb62e5e9bd47bc0aabd1a43e8f1f3aaa38da,2025-06-16T09:15:20.013000
CVE-2025-6115,1,1,32bbc5cdf3c9f9122ab43d4c3b5bb801120d95e215918d847e6d845ba16a808c,2025-06-16T09:15:20.300000
CVE-2025-6112,0,0,03192921fcb3ce4b573c976cde60b3298c837468da8da701519d4ad029a6e0e6,2025-06-16T08:15:20.010000
CVE-2025-6113,0,0,c228ada00f832720a15995e7d0fadbc924d7d4afc603f57e382f08aa1623a1a9,2025-06-16T08:15:20.227000
CVE-2025-6114,0,0,227f4fe7537286c6d9a129b77082eb62e5e9bd47bc0aabd1a43e8f1f3aaa38da,2025-06-16T09:15:20.013000
CVE-2025-6115,0,0,32bbc5cdf3c9f9122ab43d4c3b5bb801120d95e215918d847e6d845ba16a808c,2025-06-16T09:15:20.300000
CVE-2025-6116,1,1,e0de3d7ac6a4f604e21d9f1d0a7c0b0c9fd8675024729a1ca952d29322d57a68,2025-06-16T10:15:20.987000
CVE-2025-6117,1,1,e51de84939057413d12368889ff0680303c35a94f8fed05820d1e15fbc3936ad,2025-06-16T10:15:21.233000
CVE-2025-6118,1,1,59281c1be05d678998d7562bc999c0e1597e559b30bd0f13cfcac083463a8a90,2025-06-16T11:15:19.007000
CVE-2025-6119,1,1,2d25941a6f4eb40034bc2298155ef6b3d61736635b70da4432f1fb60ad69450b,2025-06-16T11:15:19.210000
CVE-2025-6169,0,0,ac06daff660839c238a07ac6aebf260af42d84f3956ac01d7a286965b2162754,2025-06-16T07:15:20.077000
CVE-2025-6172,1,1,342c6cc2700d8cffe114ebae7fb0f638875c5b55bb4327392295802843114037,2025-06-16T09:15:20.493000
CVE-2025-6172,0,0,342c6cc2700d8cffe114ebae7fb0f638875c5b55bb4327392295802843114037,2025-06-16T09:15:20.493000

Can't render this file because it is too large.